Method, program and system for efficiently hashing packet keys into a firewall connection table
a firewall connection and packet key technology, applied in the field of computer networks, can solve the problems of large number of connections sometimes occurring that exceed the storage capacity of the table, and the computer on the private network (intranet) is susceptible to malicious attacks by hackers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0085]FIG. 1 shows a highly simplified network 100 in which the connection table mechanism of the present invention could be implemented within the firewall accelerator within each firewall 108. The Internet or other network 102 connects to Edge devices 104. Each edge device might or might not contain an instance of a firewall 108. Edge devices also connect subnets 106. In turn, two subnets might be connected by a Bridge device 110. A Bridge device might or might not contain an instance of a firewall 108. Because Edge devices, subnets and Bridge devices are well known in the prior art, further discussion of these entities will not be given.
[0086]FIG. 2 shows a block diagram for one embodiment of hardware 200 used with a connection table within a firewall accelerator within a firewall, which is labeled 108 in FIG. 1. Random Access Memory (RAM) 202 stores updates of information as included in the present invention. A Central Processing Unit (CPU) 204 has access to data stored at conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


